General

  • Target

    235e6cd853eb3467ffb26228e288928ae42994a934839d7c3fb18d27623042b3

  • Size

    414KB

  • Sample

    220612-b9qlzshcbr

  • MD5

    670f6fb91da0dda3a6dbf0fef0a87f4b

  • SHA1

    d03809ae3ae0311442951b1a270b108a932e1c56

  • SHA256

    235e6cd853eb3467ffb26228e288928ae42994a934839d7c3fb18d27623042b3

  • SHA512

    04c215a335ae420981e6220f7bbd778e52c046453e2cda57c1700eafb6b8df2bd084b2f0b67c5a13189815806770386957361e57a7778ca78a3ce58112682718

Malware Config

Extracted

Family

smokeloader

Version

2019

C2

http://autopartsmagazzine.com/

http://magazinzapchasti.ru/

http://neponilomancitlimposup.ru/

http://himolamodaspopular.ru/

http://avstralopitek.bit/

rc4.i32
rc4.i32

Targets

    • Target

      235e6cd853eb3467ffb26228e288928ae42994a934839d7c3fb18d27623042b3

    • Size

      414KB

    • MD5

      670f6fb91da0dda3a6dbf0fef0a87f4b

    • SHA1

      d03809ae3ae0311442951b1a270b108a932e1c56

    • SHA256

      235e6cd853eb3467ffb26228e288928ae42994a934839d7c3fb18d27623042b3

    • SHA512

      04c215a335ae420981e6220f7bbd778e52c046453e2cda57c1700eafb6b8df2bd084b2f0b67c5a13189815806770386957361e57a7778ca78a3ce58112682718

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks